Zeljka Zorz
WordPress users endangered by Trojanized plugins
Three popular WordPress plugins have been Trojanized by unknown individuals and made available for download, warned WordPress yesterday. “Earlier today the WordPress …
Certification authority reports security breach
Another certification authority has fallen prey to attackers in need of certificates for phishing authentication pages. The authority in question is StartSSL, operated by …
Dropbox security glitch allowed anyone to access user accounts
Web-based file hosting service Dropbox has confirmed that a bug introduced by a code push allowed anyone to access any user account by simply typing in a random password for a …
Japan criminalizes malware creation and distribution
The Japanese parliament has finally passed a law that punishes malware creators and distributers – and even people who acquire/store malware – with jail time and a …
German hackers sentenced for stealing Lady Gaga songs
The two German youths that have been arrested in December for stealing unreleased songs of over fifty recording artists and selling them online have been found guilty of …
Spam e-books plague Amazon’s Kindle store
If you are a regular customer of Amazon’s Kindle store, you could already be aware of the fact that spammers are using it to fleece customers out of their hard-earned …
Sega hacked, 1.3 million accounts compromised
Sega Corporation was attacked and its database breached last week, and the fact was confirmed by the company the day after it took its SEGA Pass system offline on Thursday. …
LulzSec teams up with Anonymous for Operation AntiSec
Over the weekend, LulzSec has seemingly finally moved away from being in it “for the lulz” and has acquired a cause: it has announced it has teamed up with …
iCloud search ends with fake AV
Following Steve Jobs’ announcement of Apple’s entry into the cloud business, the term “iCloud” has quickly become a trending topic. And cyber scammers …
Trojan targets devices with custom Android versions
A Trojan targeting rooted smartphones and those with custom built versions of Android has been spotted on third-party Android markets in China. Lookout researchers have dubbed …
LulzSec leaked passwords come from Writerspace
Following LulzSec’s sharing of a list of 62,000+ random login credentials, people who have been looking into it say that some of them are likely to come from online …
Trojan goes after Bitcoins
Bitcoin – the digital currency that has lately become a point of contention between those that consider it a perfect way of handling payments online and those who said …
Featured news
Resources
Don't miss
- How global collaboration is hitting cybercriminals where it hurts
- Vet: Open-source software supply chain security tool
- Bankers Association’s attack on cybersecurity transparency
- Attackers breached ConnectWise, compromised customer ScreenConnect instances
- Product showcase: Smarter pentest reporting and exposure management with PlexTrac